NSA Subliminal Scripts
Source Deceased
This has been in my possession for years now. The original
was sent to me sometime back in '99 but included dozens of religious references
that led me to believe the sender had probably slipped into some paranoid
schizophrenic fantasy-land and I dismissed it as nonsense and filed it away
under crackpots. The original document was destroyed but part of it was saved in
an old backup file which I recently came across. I debated whether to delete it
or not then decided that it might be useful in giving some of you an idea of
what could possibly be done by the government. Part of it may be referred to in
the book I am working on, which may never be finished, so please don't use it
without referring to the source. If anyone has seen this document before or can
shed more light on any aspect of it please let me know. I left the top secret
heading intact for dramatic effect.
TOP SECRET
Subliminal Posthypnotic Scripts
Subliminal implanted posthypnotic suggestions and scripts
using acoustically delivered and phonetically accelerated posthypnotic commands
without somnambulistic preparation in the subject for intelligence and
counterintelligence applications by the United States National Security Agency.
1. INTRODUCTION:
1.1. The following information is an overview of
‘Project*** already in ‘***** Phase (Q)’ and administered by Unit ‘(***)’ of
NSA’s Intelligence ***** ******* ******* *****. A Technology Title,
Applications, Technology Description, case history summaries and the NSA's
Behavioral Modification Procedure Outline documented for non-technical customers
on a Code (***) ‘******’, basis.
TECHNOLOGY TITLE:
2.1. Subliminal Implanted Posthypnotic Suggestions and
Scripts Using Acoustically Delivered and Phonetically Accelerated Posthypnotic
Commands without Somnambulistic Preparation in the Subject for Intelligence and
Counterintelligence Applications by the United States National Security Agency.
"Computer Simulated Subconscious Speech Language".
3. APPLICATIONS:
3.1. Intelligence:
3.1.1. Used on foreign and domestic diplomats, spies, and
citizens to gather intelligence, steal advanced technology for US Defense
applications. Surveys of citizen's opinions to government events and propaganda.
Heavy survey use during times of war, economic strife and political elections.
War against drugs. Used to identify investments that have high yield to support
clandestine operations. Used to direct field agents without the agents having to
carry communications hardware and encryption devices.
3.2. Counterintelligence:
3.2.1. Used on foreign and domestic diplomats, spies, and
citizens to identify intelligence operations; scope, participants, communication
methods, and weaknesses in individuals, systems, equipment, or signals that can
be exploited. Additional applications include misinformation dissemination,
confusing and confounding leaders during critical decision moments, distorting
significance of various facts to sway decisions and actions in US favor,
behavioral modification of foreign spies to betray their loyalties, self
initiated executions (suicides).
3.3. Behavior Modification and Accelerated Resocialization:
3.3.1. This technology is used to develop and control
spies, political candidates, and other public figures through psychological
intimidation, fear and extortion.
3.3.2. The NSA uses this technology to resocialize
(brainwash) the US civilian voting population into ***********************
(giving up their personal will and civil rights to the NSA). Each subject is
required to maintain a ******************* (following the precepts of the
******* and doing what is ordered by the NSA). The technology is also used to
monitor and optimize NSA employee performance and loyalty.
4. DEFINITIONS AND ACRONYMS:
4.1. Age Regression: The act of bringing back past memories
in a subject though the use of hypnosis. The memories can be very vivid and real
in the mind of the subject.
4.2. Hypnoamnesia: Temporary loss of memory due to a
posthypnotic suggestion.
4.3. NSA: United States National Security Agency, Fort
Mead, Maryland.
4.4. ODO: On-Duty Officer, or officer-on-duty.
4.5. Posthypnotic Command: Same as Posthypnotic Suggestion.
This term "Command" is more commonly used when the hypnosis is forcibly given to
the subject and when the subject's will has been broken down though the use of
REM Sleep Deprivation and Suggestibility Index increasing drugs like CNS and
Cardiovascular Stimulants. The exposure to extreme REM deprivation and select
chemical stimulants causes the subject to have no ability to resist the
"Suggestion" any longer thereby making it a "Command".
4.6. Posthypnotic Suggestion: A subconscious suggestion or
command resident and potentially active in the subject following a hypnotic
trance or period of direct access to the subconscious mind.
4.7. Posthypnotic Suggestibility Index: An index or rating
of a subject's susceptibility and sensitivity to hypnosis.
4.8. REM DEP: Abbreviation for REM Sleep Deprivation or REM
Deprivation. A subject deprived from REM Sleep has multiple symptoms i.e.
reduced protein synthesis, black circles around eyes, loss of short term memory,
confusion, impulsiveness, anger, frustration, diminished self-esteem, increased
suggestibility, reduced productivity, apathy, and depression. Long term REM
Deprivation results in death.
4.9. Script: A carefully constructed series of words
arranged in the form of a posthypnotic suggestion. The script will generally
consist of four separate parts;
· (1) an identifier (subject's name, description, or other
identifying factor),
· (2) trigger activation condition or conditions (when,
what or how the suggestion will trigger),
· (3) the content (what the trigger will precipitate in the
perception of the subject),
· (4) and a duration (when or under what conditions will it
stop or finish).
Additional reinforcing scripts are usually added to
"strengthen" or reinforce the central posthypnotic command.
4.10. Somnambulatory State: An abnormal condition of sleep
in which motor acts (like walking, running) are performed. This state is
typically achieved and a prerequisite to traditional hypnosis.
4.11. Subliminal Implant: A posthypnotic suggestion
successfully delivered to the subject's subconscious mind.
4.12. Transceivers (NSA): Nearly microscopic electronic
surveillance devices that collect and transmit encrypted audio, color video, and
location coordinates collected at the subject site to NSA Satellites that in
turn forward it to NSA central intelligence operations. The devices also receive
encrypted audio scripts from NSA central intelligence operations through the
satellites and deliver it to the subject's site in the form of a subliminal
posthypnotic suggestion. These devices are approximately the size of the head of
a straight pin and can be concealed in houses, offices, automobiles, planes, and
street corners.
5. TECHNOLOGY OVERVIEW:
5.1. In addition to the ability to see and hear what is
going on inside people's homes, vehicles, and businesses through the use of
nearly microscopic digital surveillance technology, the NSA is able to
interrogate and influence a person subconsciously without the knowledge or
consent of the subject.
5.2. Thought Labels (Response Labels):
5.2.1. Have you ever watched a baseball game? Did you see
the catcher and pitcher communicate using a series of itches, baseball cap
rearrangement, and clothing tugs? An elaboration of this communication technique
is used by the NSA to detect a fleeting thought in a subject or "read minds" so
to speak.
5.2.2. Lets discuss how an itch, clothing tug or even an
innocent sneeze can be used to label a thought. For simplicity, we will call
itches, clothing tugs, sneezes, coughs, or involuntary muscle spasms that are
performed during subconscious interrogation "thought labels".
5.3. Post-Hypnotic Delivery Method:
5.3.1. The NSA combines hypnosis and thought labels to
interrogate people without the subject being aware of it. "How can hypnosis be
used?" you might ask. The subconscious mind operates at a speed of about 1200 to
1400 words per minute. This is many times faster than the conscious mind that
operates at 250 to 450 WPM (words per minute). The posthypnotic script can be
spoken at fast conversational speed approximately 250 WPM and a recorder or a
computer speeds up the message up to approximately 1200 to 1400 WPM. Remember
what happens when you play a 33 rpm record at 78 rpm?
The resulting voice sound like the old American cartoon
characters the Chipmunks. This is only slightly past doubling (2X) the delivery
speed. At speeds as high as 1400 WPM, the voices would sound like a high pitched
chattering whine. Remember when the words "Drink Coca Cola" were written on one
frame of a movie in a theatre back in the 1960s?
The frame rate in movies is played at 30 frames/second. At
1/30th of a second the conscious mind could not recognize the message but the
subconscious mind could read it clearly. The audience increased their Coca-Cola
consumption by 65% that night resulting in the Federal Government prohibiting
subliminal advertising. The following probable reasons for not achieving a
higher percentage of subliminal delivery effectiveness (> 65%) are described as
follows. In that 1/30th of a second some people were blinking, some people were
looking around the theatre, looking at spouses, children, candy, popcorn, etc.
or they had sufficiently poor eyesight that they could watch the movie but could
not distinguish the small writing clearly.
5.3.2. In the early years of this technology, the NSA
originally recorded a spoken posthypnotic suggestion message into a tape deck
and sped it up by speeding up the tape. This process was labor intensive,
required each officer to have excellent diction and mastery of the language and
dialect required, and was of poor quality due to background noise and the delay
in timing during recording and processing.
It also required extensive training to assure that each
officer spoke at the same rate of speed so that the resulting "sped-up" script
was delivered at the correct speed. Now computers are used to append digitized
samples of optimized, ideal phonemes together to form words and the words are
sped-up to the correct delivery speed. Where dialects are present, a different
set of base phonemes is used.
5.3.3. Currently, to optimize efficiency and accommodate
the variety of languages on the planet, phonetic elements from each language and
distinct dialect are sampled, digitally edited to optimize them, and appended
during delivery to form words and words arranged to make sentences in the from
of scripts that resemble hypnotic suggestions. The empty space between words is
minimized and pitch rise is compressed and filtered. Repetitive sine waves are
also removed from the phonetic element's acoustic wave train thus reducing the
actual number of sine waves making up a word by 50% or more.
This reduces the actual length of the time it takes the
phoneme to be delivered prior to accelerating (speeding-up) the delivery (like
fast forward). This helps the message to be played at higher speeds and reduces
the subject's ability to recognize it as accelerated speech. The technique of
using optimized digitally sampled and edited phonemes appended together to for
words and then sentences structured as hypnotic suggestions can be termed
"computer simulated subconscious speech language".
5.3.4. The subconscious mind is also very sensitive. It can
hear things that the conscious mind ignores. If you have watched television, you
have probably noticed that there are many "subliminal tapes" on the market to
program your subconscious mind. These tapes have their "messages"
recorded/hidden in the sounds of ocean waves, music, or other sounds but they
are not sped-up to subconscious delivery speeds and are therefore not very
effective.
The subconscious mind can hear and discern the message even
when there is background noise like waves, cars, planes, or even when someone
else is speaking to you in normal conversation. Your conscious mind won't hear
anything unless it is very quite in the house. If you are very attentive you may
hear what sounds like a low-pitched tape on fast forward, and played at low
volume. This is the sound of the NSA's high-speed audio subliminal message.
5.3.5. This modification of the phonetic elements, played
at low volume, combined with the environmental background noise makes it very
difficult for a subject to record the NSA message. Even if the subject were to
effectively record the message, it is very difficult to filter (separate) the
NSA's message from background noise.
Then, reconstructing the missing sine waves from the
acoustic wave train and slowing the message down to discern the actual content
of the "posthypnotic" script with the conscious mind would be nearly impossible
for the average citizen. To briefly summarize, the subject would have no chance
in analyzing a NSA message without the following items:
5.3.5.1. Professional state-of-the-art technology recording
equipment.
5.3.5.2. Digital acoustic wave editing equipment.
5.3.5.3. Advanced engineering knowledge of acoustic wave
science.
5.3.5.4. Phonetics and linguistics expertise.
5.3.5.5. Hypnosis theory and scripting. 5.3.5.6. Ideal
environmental conditions for recording.
5.3.5.7. NSA ignorance of the subject's intent and ability
to capture a message.
5.3.6. This technology is the perfect intelligence tool. It
is nearly impossible to detect or measure, difficult to trace back to the NSA.
The symptoms that the NSA can "program" or inflict into the subject can cause
fear that they might be thought to be insane if they were to report the NSA
activities.
The subject does not know the source of the technology or
the technology itself, the subject has no proof or evidence, only their
perception, suffering, and isolation. Additionally, potential recourses that are
available to the subject can be interrogated out and preventative actions taken
by the NSA to further isolate or disable the subject.
5.4. Using the Post-Hypnotic Delivery Method with Thought
Labels:
5.4.1. The NSA technique is simple; they transmit their
human programming message through the audio-visual electronic surveillance
equipment installed in your home, car, or office to you. The subliminal message
delivered to you could be "Mr. Jones, imagine that the IRS were auditing your
taxes. Think back to a time you have cheated on your taxes and that you are
worried that the IRS might find out in an audit.
If you have never cheated on your taxes and have nothing to
fear you will feel an itch on your right-hand ear lobe that will go away when
you scratch it. If you can be caught by an IRS audit, you will feel an itch in
the left nostril of your nose that will disappear after you itch it twice." From
your perspective, you have just had a fleeting thought about your past tax
returns and had an innocent itch (thought label).
To the NSA Officer On Duty (ODO), you have just
communicated to him whether you have ever: 1) cheated on your taxes, and: 2) If
the IRS could catch you in an audit.
5.4.2. This is a very oversimplified example of a typical
NSA interrogation. Actual interrogation messages may consist of several hundred
words and be very complex and sophisticated. Most messages consist of several
dozen words. Yes indeed, the NSA has exceeded the wildest expectations of the
book "1984". As you can imagine, the spy world has reached a new plateau that
directly affects every person in the USA and abroad. This electronic
surveillance system extends down through Mexico, Central America, and deep into
populated regions of South America. It also has been installed in Australia,
Africa, and the free-world countries in Europe.
5.4.3. The NSA's goal is to have the whole world under its
electronic eye by the year 2000. They are almost there now, but are having
difficulties with high-tech countries that have the counterintelligence
resources to identify the high frequency bursts of microwave transmission from
the transceivers. The system also has the ability to take a "voice print" from
any person and place it on file. This file can be used to locate the subject
later by comparing it to real-time surveillance audio samples received from the
field as long as the subject is speaking in close proximity to a transceiver.
If the person is aware that the NSA has this capability and
remains silent, the NSA can transmit a periodic worldwide subliminal message
that addresses the person by name and causes them to dream and talk in their
sleep. After the person talks, the voiceprint would be eventually identified and
the person's location can be identified nearly anywhere in the world. Yes, it is
a small world, and getting smaller all the time.
5.4.4. This technology was originally conceived under CIA
studies and fascination with the power of hypnosis in the late 1950's and
perfected by very early 1960s and implemented with unlimited resources to all
areas of vital national security interest first. Originally, after noting the
behavioral effects in visual subliminal effects like the highly publicized event
where stating "Drink Coca Cola" on a single movie frame "delivered a higher
rates of speed than normal movie viewing raised the obvious question, "Does the
human hearing work as good as eyesight accepting subliminal messages?"
Preliminary theory work was transferred to Fort Mead NSA
who had expertise in characterizing language in analog domains where a sampled
phoneme could be edited (shortened by removing excess sine waveforms from the
"acoustic wave train") and electronically reconstructed back into shortened
words of language. Some of the early experiments included "Remote Viewing at NSA
where the Viewer would relax, open their mind and explain the clarity of images
that were described by the NSA using this technology.
These early experiments allowed the NSA to refine the
specifications of the "Computer Simulated Subconscious Speech Language" and the
scripting formats to maximize the ability to deliver an accurate "vision or
picture" into the subject. Pictures already seen by the subject could simply be
recalled using "Age regression" script variations.
6. OTHER REFERENCE MATERIAL:
6.1. Please refer to the book "Inside America's Most Secret
Agency, The Puzzle Palace" by James Bamford, Published by Houghton Mifflin
Company, 1982. This book contains extensive information and references on the
NSA's history and the NSA's first surveillance system that originally only
eavesdropped on telephones and is now expanded to audio-visual.
7. NSA CASE HISTORY EXAMPLE SUMMARIES:
7.1. NSA Self-Initiated Execution (Suicide): 7.1.1.
Bamford's "The Puzzle Palace" references one of the NSA's first self-initiated
execution (suicide) with this "Thought Control" technology they developed. The
NSA employee reportedly ranoff NSA property saying demons were in his mind and
he killed himself.
7.2. NSA Initiated Execution to Cover-up in the News:
7.2.1. A University of California at Berkley student that went into a bar on or
around November 27, 1990 took hostages and insisted to the police that the CIA
Director talk with him so that he could get relief from the suffering. The young
man had sent letters to the president and the CIA but the requests had fallen on
deaf ears.
After the young man panicked and shot a customer in the
bar, a SWAT team fatally shot him, the San Jose police found copies of the
letters written to the President referring to people that could "read minds" and
that he had learned how they do it. The NSA had been unsuccessfully brainwashing
him and had no alternative but to terminate him to assure their security. It is
interesting that what was originally broadcast on the news "The gunman was
demanding to talk with the Director of the CIA" etc. disappeared quickly
(suppressed?) from later news accounts.
7.3. NSA Initiated Execution to Cover-up in Music: 7.3.1.
Removed by jar2 Mostly Religious References
7.4. NSA Initiated Executions in Overseas Defense Project:
7.4.1. Some years back several employees of the United
Kingdom's Government working on a top secret Radar Project committed suicide
with no apparent penetration by a hostile government, drug abuse or any other
commonality other than working in a secured government project. They were not
"Staged" suicides (murders) because some of them happened behind doors that
could not be opened from the outside. These men were subjected to the same
technology and processes that the Removed by jar2 thousands of others have
experienced.
7.5. Musical references of NSA Technology:
7.5.1. Removed by jar2(like a tape on fast forward).
Removed by jar2
7.6. NSA Counterintelligence Experiments: Removed by jar2
7.6.1. Many experiments were performed by the NSA to
determine the conditions and procedures that would be required to turn spies
that were trusted by US enemies into assassins that we could invisibly manage.
In early experiments, the resulting NSA experimental subjects would get
extensive attention in the news because of the horror and unusual nature of the
atrocity.
7.6.2. Removed by jar2 his desire for survival overpowered
the NSA's behavioral conditioning. After he was imprisoned, he spoke about how
all of a sudden his mind became clear and he couldn't figure out how he could do
this crime.
The hypnosis was simply removed and the subject was allowed
to sleep so that experts studying the file would not find out anything if the
subject would have been subjected to traditional hypnotherapy or other
psychoanalytical techniques. Another successful counterintelligence experiment
completed with no liability or traceability to the NSA.
7.6.3. Perhaps ten years ago I read of several elderly
people who died of sleep deprivation in Florida. The doctors tried everything
they could do but could not stop the sleep deprivation that resulted in a 100%
effective termination yield. The NSA had developed the right combination of
delivered anxiety scripts combined with muscular tension and delivery schedules
optimized according to decreasing post hypnotic durability over time as the
subject's health degraded.
7.6.4. David Koresh of the Branch Davidians Removed by jar2
experiments in mind control and social pathology.
7.6.5. A friend of mine, David Sautter and I worked at
Singer, Kearfott Division, producing government weapons where we worked under a
multi-tier security system; Company Security, FBI, DIA, and at the top of the
ladder watching the watchers; the NSA. I discussed the NSA's technology with
Dave and a few months later, I heard he had committed suicide inside of a locked
room. Removed by jar2
7.7. The cases of NSA activities go on and on. With access
to the FBI's Crime Information Center (CIC), we could find several thousand
files having the characteristic patterns where the NSA had experimented on the
individuals with their "Thought Control" technology.
7.8. Currently, the NSA has many subjects in the field (our
society) that need only a series of "triggers" (carefully constructed
posthypnotic scripts) to send them over the edge and on a mission to kill. The
NSA calls them "Shooters on a Shelf". A recent example was Russell Eugene
Weston, Jr. that went on a shooting spree at the Capitol around July 26, 1998.
He was diagnosed with schizophrenia, had delusions that he had an affiliation
with the CIA or FBI and thought a radio-tracking device was planted in his
tooth.
He was a product of NSA brainwashing. He did not have the
ability to recognize the advanced technology even though he knew that "someone"
(CIA, FBI, etc.) was communicating with him and that this communication ability
spanned across the USA leading him to believe that he had a tracking device
planted on him. Because of the real effects of the NSA hypnosis treatments, he
therefore reasoned that the schizophrenia medication would not help and so he
quit taking it. This was a man desperately trying to alleviate the suffering the
NSA inflicted on him.
7.9. Through the years, I have met thousands of people that
have been brainwashed into Removed by jar2
8. NSA BEHAVIORAL MODIFICATION PROCEDURE:
8.1. The following procedural outline documents typical
techniques, processes, explanations, and definitions of the National Security
Agency's Behavioral Modification Procedure using Subliminal Implanted
Posthypnotic Suggestions through acoustically delivered phonetically edited
language elements combined into scripts without somnambulistic preparation in
the subject.
8.2. In simpler terms, the subject is unknowingly given
hypnosis while the subject is completely awake and is tortured and punished with
this hypnosis into a predetermined behavior by the National Security Agency. The
behavior is usually extremelyRemoved by jar2
8.2.1. ABSTRACT, Behavioral Modification:
8.2.1.1. The NSA's behavioral modification process starts
with identification and qualification of the subject. The NSA used to choose
subjects based on the subject's net present value to the agency in public
visibility, financial resources, political clout, or other intelligence and
counter-intelligence reasons. Additional considerations are given to minimizing
security risks of exposure, the subject's posthypnotic suggestibility index, the
subject's intelligence and reasoning ability, moral and superstitious beliefs,
and the subject's social status and the weakness of the subject's primary
support groups (family).
Now a recent report referenced in the March 26th Business
section of the Orange County Register from the National Sleep Foundation reports
that 40% of Americans are experiencing sleeping problems. This news could
indicate that the NSA is broadening its influence to the greater public. As
explained below in this document, the NSA always starts its behavioral
modification process with REM Deprivation.
8.2.1.2. After selection, the subject is subjected to long
periods of REM Sleep Deprivation and reinforced torturing posthypnotic
suggestions that will breakdown the subject's will, confidence, self-reliance,
and moral values. Meanwhile, the subject is increasingly isolated from their
familiar and trusted peer groups causing the subject to experience depression,
apathy, and ultimately social and financial failure.
8.2.1.3. Typical post-hypnotic induced delusions reported
by subjects are tingling in various areas of the body, which are thought to be
resulting from microwave beams. Hearing ticks thumps or cracks from walls,
ceilings, clocks, lights, etc. Beliefs that the subject's neighbors are
conspiring against them, or that the subject is being followed. Sometimes
subjects believe that the various perceptions, feelings and experiences are the
result of "Implants" in their body.
It is important for the subjects to understand that the NSA
controls this technology from nuclear hardened underground shelters and the
neighbors next door have nothing to do with the subject's experiences. Nobody
has the time or inclination to follow a subject around with a microwave gun to
tickle various parts of the body.
We are saturated with microwaves all the time from
television stations, communication satellites, etc and yet we do not have any
symptoms because microwaves do not have the ability to trigger localized
synaptic responses in our brains. Furthermore, when the subject is in a room
surrounded by several people, and the subject is the only one experiencing the
"thoughts", tingling feelings, etc., then obviously a delivery method is being
employed that affects only the subject; high-speed acoustic delivered hypnosis.
8.2.1.4. After a while, the subject has an emotional
breakdown and a new support group is built around the subject. The new support
group is typically aRemoved by jar2but the NSA also uses Removed by jar2The NSA
prefersRemoved by jar2 thereby masking the NSA's technology and processes.
When the NSA uses other relationships without in which the
subject experiences a religious awakening and Removed by jar2d the NSA achieves
total control of the subject. 8.2.1.5. The subject is slowly released from the
damaging uncomfortable hypnosis and it is replaced with positive rewarding
hypnosis as "Removed by jar2
8.2.1.6. The subject is required to give daily status
reports in the form ofRemoved by jar2n the privacy of their home, office, or car
where the NSA's electronic surveillance system captures and sorts the Removed by
jar2by "Keywords". The NSA then delivers additional hypnosis in the form of
punishments or rewards or directs the subject accordingly to "Removed by jar2 If
the subject resist's the NSA's instructions, additional punishments are
inflicted on the subject.
8.2.1.7. The subject is institutionalized in this system
where any nonconformance committed by the subject is watched, critiqued, and
reported on through Removed by jar2 to the NSA. Thus, the new Removed by jar2
acts as a behavioral reinforcing mechanism that will bring any of the subject's
problems to the NSA as they have been trained themselves (this is similar to the
Nazi Gestapo of World War 2 and other Removed by jar2).
8.2.1.8. A subject that has successfully completed the
NSA's behavioral modification program lives out the rest of their mediocre life
in service toRemoved by jar2 (NSA) and never causes any waves in the Removed by
jar2for fear of reprisal from the NSA. The subject's lives are relatively
unproductive because their focus is on their "Life after death" and not what
they accomplish while they are alive. They avoid "worldly activities", and
usually are confused and disjointed in rational thoughts and concepts. For
instance, they don't believe in anything that is not in the Removed by jar2,
i.e. dinosaurs, evolution, space travel, even though they ride on airplanes and
watch television both of which are not referenced in the Removed by jar2
8.3. BEHAVIORAL MODIFICATION PROCESS:
8.3.1. Triggering Techniques:
8.3.1.1. The NSA minimizes security risks by using multiple
posthypnotic delivery techniques for applying negative reinforcement into the
subject. The patterns fall into three major categories; real-time deliveries,
prescheduled deliveries via a preprogrammed computer, and posthypnotic or
"conditional" deliveries. The NSA does not use real-time transmitted
posthypnotic commands exclusively because the subject might recognize when the
NSA was not actively watching causing a security concern and it would be cost
prohibitive to baby-sit the subject 24 hours a day.
8.3.1.2. Behavioral modification generally occurs fastest
when using negative reinforcement continuously. It is not practical or
economical to watch a subject continuously to apply real time deliveries.
Additionally, using all three script delivery patterns confuses the subject,
causes the subject to believe they are always being watched, and maximizes
behavioral change over time though continuous pressure.
8.3.2. Real-Time Subconscious Implant Delivery:
8.3.2.1. Real-time means that the NSA ODO is transmitting
the posthypnotic command script to the subject and observing the subject's
response. This technique is required for subliminal interrogations. All NSA
standard posthypnotic command scripts can be delivered real-time. This form of
delivery can precipitate the perception of a "voice" heard in the mind of a
subject to give them information (true or false) or orders depending on the
purpose of the NSA's activities.
8.3.3. Prescheduled Subconscious Implant Delivery:
8.3.3.1. The NSA central switching computer can transmit a
script to a specified subject at a pre-specified time. The transmitted script's
transmission range can be limited to a single building, a city, or a large
geographical area (i.e. North America or Europe). By having prescheduled
scripts, the subject has seemingly randomly occurring thoughts and feelings that
can't be associated with a commonly recurring situation like event-triggered
scripts precipitate.
8.3.4. Event-Triggered (conditional) Implant Delivery:
8.3.4.1. Posthypnotic subconscious implants that are
triggered (activated) with an event, thought, or code word (event-triggered or
conditional) are strongly experienced by the subject and are powerful tools for
reinforcing a predetermined desired behavior and inflicting delusions.
8.3.4.2. This type of posthypnotic commands are the ones
most commonly used by hypnotherapists to help people quit smoking, study better,
or in general, change behavior (behavioral modification). There is extensive
information on the Internet and college libraries about this form of
posthypnotic command delivery and how to "script" and use them.
8.3.4.3. The NSA can reinforce a predetermined desired
behavior by associating a subconscious implant (negative or positive
reinforcement) with an event. An example is that when the NSA want's to isolate
the subject from the company of a specific person place or thing, the subject
will be implanted with a feeling of increased anxiety, hostility, tension,
simple discomfort, or a feeling of a lack of peace. When the subject leaves the
person, place, or thing, another posthypnotic implant is triggered that rewards
the subject's behavior with a feeling of relief from the anxiety, hostility,
tension, discomfort, and peace is restored in the subject's mind.
Example: This script will always cause a girl or boy not to
sleep with the opposite sex: "You will feel very tense and not be able to relax
if you kiss, sleep with, or stay long at your (boy or girl) friend's house and
you will feel a deep peace when you leave their house to go back home". These
types of scripts left unmanaged and not removed can cause great harm as the
subject develops and social conditions and behaviors change over time.
8.3.4.4. It should be noted that the NSA precisely tailors
the type of negative and/or positive reinforcement, the degree of the
reinforcement, the duration of the reinforcing effect and the conditions of the
trigger. This posthypnotic event-triggered reinforcement can be initiated
gradually and can remain so subtle that the subject believes that the discomfort
is naturally occurring and that it is the subject's decision uninfluenced by
anyone else that the subject should avoid the person, place or thing.
8.3.4.5. This subconscious implant can be combined with
other implants like a posthypnotic-triggered thought to enhance the subject's
decision toward the situation. For example the subject can be subconsciously
implanted with a command to be very sensitive to the changes in their feelings
and to feel great about making strong decisions to take charge of their lives.
This can be reinforced with another posthypnotic suggestion to avoid all the
situations that cause the subject discomfort and that each time the subject
commits himself/herself to removing a situation of this kind in their lives,
they will feel an increasing control over their lives. Note that as the subject
perceives an increasing control over their lives they are actually losing
control to the NSA proportionately. Numerous other examples exist and it is
beyond the scope of this document to document every possibility.
8.3.5. Stage 1 (Prescreen Evaluation):
8.3.5.1. The subject's Posthypnotic Suggestibility Index is
determined by a series of simple tests. Hypnoamnesia is applied to the subject
for the name of an object or individual and the subject's speed is timed to
determine how quickly they can overcome or not overcome the posthypnotic
suggestion "You will not be able to remember the name of "____" no matter how
hard you try.
Other posthypnotic suggestions can be used to create fear
or discomfort in the subject that can be remedied by flight or movement. The
subject must overcome a posthypnotic suggestion that they cannot move no matter
how hard they try. In summary, a posthypnotic suggestion is given to the subject
and the subject's ability to overcome it is evaluated.
8.3.5.2. A full study of the subject's religious,
superstitions, fears, and insecurities is made through standard subliminal
interrogation techniques and behavioral observation.
8.3.5.3. Interrogation scenarios are presented to the
subject using standard subliminal interrogation techniques and somnambulistic
interrogation techniques. The standard two types of scenarios are "Open-ended
Questions" (similar to multiple choice with response labels pre-assigned to each
choice) or "Reject if Disagreeable" (negative response label if the subject
disagrees). More advanced techniques of interrogation scenarios are used as
required or as determined by the experience of the ODO.
8.3.5.4. Real-time observation, standard subliminal
interrogation techniques and somnambulistic interrogation techniques are used to
determine the subject's overall social status, abilities, attitudes, and
communication skills with primary support groups and friends. 8.3.5.5.
Scientific understanding and practical applications experience in the fields of
psychology, hypnosis, pharmacology, and problem analysis are considered risks in
the subject that may complicate or inhibit subsequent behavioral modification
processes. Once the subject identifies the technology used it is nearly
impossible to contain the potential security breach without terminating the
subject. Most NSA initiated executions (suicides) are the result of the subject
identifying the technology used or carelessness on the part of the ODO managing
the file.
8.3.5.6. The NSA technology affords powerful control over
the subject, the subject's environment, and the subject's ability to plan and
implement a disclosure to appropriate Government Agencies. When the subject
finally does achieve a disclosure, the subject's physical and mental condition
is depleted. The subject's ability to communicate concisely has been arrested,
and the subject has already been set up and dishonored in the sight of local and
federal law enforcement agencies to assure the subject's testimony is
questionable and unsubstantiated. Where the NSA feels that these steps cannot be
achieved in medium risk subjects, the NSA will not recruit the subject into the
behavioral modification process.
8.3.6. Stage 2 (Standard Process): 8.3.6.1. This stage is
where most subjects are behaviorally modified to serve and follow "God" (AKA NSA
management of the subject's civil rights). If the subject accepts Removed by
jar2direction at this stage the NSA reinforces the subject's relationship with
Removed by jar2and closes the file. This shortened program receives the maximum
return for the NSA for the least investment and minimizes the security risk. It
also causes the least amount of damage and institutionalization in the subject.
8.3.6.2. Coincidence:
8.3.6.2.1. Coincidence is used to create the perception in
the subject that supernatural events are beginning in the subject's life. A
combination of posthypnotic commands and pre-information awarded to the subject
prior to an upcoming experience that the NSA intelligence system has discovered
gives the subject a feeling that Removed by jar2
8.3.6.2.2. The following is one typical technique used by
the NSA. NSA Intelligence gathers information regarding the topic of the sermon
in the subject's church. This information is gathered through electronic
surveillance equipment installed in the church. The NSA then implants a
posthypnotic command that triggers the subject's mind into concern and
contemplation about the sermon's topic prior to going to church. When the
subject hears Removed by jar2, especially when the subject has not shared those
concerns with any other human being.
8.3.6.2.3. Another typical method used by NSA concerns
tragic events occurring to loved ones. NSA Intelligence receives a local
broadcast or preliminary information through electronic surveillance that a
subject's relative has been injured or killed. The subject is given a
posthypnotic suggestion that a feeling of dread or loss is welling up inside
them and they are directed to think of that particular loved one. When they are
finally notified through official channels, the subject believes that they
Removed by jar2
8.3.6.3. REM Sleep Deprivation:
8.3.6.3.1. The Rapid Eye Movement (REM) stage of sleep is
controlled and usually limited to one to two cycles per night resulting in
micro-sleeps during the day. REM deprivation inhibits short-term memory,
concentration, tactile abilities, verbal articulation, reasoning, and self will.
Protein synthesis is inhibited and thereby reduces the subject's ability to heal
after physical damage or after periods of extensive exercise. The result is that
the subject's general health degrades as does social bonds and work/school
performance.
8.3.6.3.2. The NSA performs control of REM Sleep through
various methods. Posthypnotic implants can be implanted that place a subject in
a light sleep (posthypnotic trance) with various combinations of muscular
tension and computer cycling implant deliveries (to be discussed later).
8.3.6.3.3. Subjects typically complain of no sleep,
restless sleep, waking up every hour on the hour, staying awake until the hour
they have to get up, waking up an hour after they retire and not returning to
sleep, and typically cannot recall any dreams. Additionally, they will complain
of repeating torturing thoughts, racing thoughts, and facial itching and
numbness. Daily fatigue, poor recall of names, and caffeine consumption is
typical.
8.3.6.3.4. Dark rings' surrounding the eyes is evident and
the darkened area around the eyes can be reported as sore or tender by the
subject. The subtle perceptual impairing effects of REM deprivation make it more
difficult for the subject to identify the REM Deprivation problem. When the REM
depravation onslaught is gradual and accompanied by a posthypnotic command that
the subject "will feel energetic and rested", the subject will not recognize the
REM Deprivation. Additional posthypnotic commands can be implanted that will
make it difficult for the subject to "see or perceive" the rings surrounding
their eyes. I have seen many subjects with very dark eye rings and the subjects
could not recognize them at all.
8.3.6.4. Shame Factor Enhancement:
8.3.6.4.1. Various posthypnotic suggestions are implanted
in the subject after a week or so long period of REM deprivation. The content of
the posthypnotic scripts is constructed to cause the subject to perform
embarrassing and otherwise shameful acts (usually sexual but always
anti-social). These shameful behaviors are used by the NSA later to shame the
person into a lower self esteem, reduced confidence in their own self
discipline, a need forRemoved by jar2. These embarrassments provide a means to
Blackmail or discredit the subject if the NSA is detected and otherwise
threatened by the subject.
8.3.6.4.2. The NSA will always use another law enforcement
agency to document the behavioral discrepancy to retain anonymity. The NSA has
been known to help subjects avoid prosecution to gain loyalty or create an
adversarial relationship between the acting agency and the subject (another
intimidation factor) even though the NSA was responsible for creating the
behavioral problem in the subject's life.
8.3.6.5. Religious Relevance and Convictions:
8.3.6.5.1. The NSA typically implants posthypnotic
suggestions that are clearly referenced in theRemoved by jar2 The subject may be
punished (through negative reinforcement) by anything that is referenced
iRemoved by jar. This component of the NSA process is to provide the subject
with an increased sense of fear and intimidation resulting fromRemoved by jar2
8.3.6.6. Paranoia:
8.3.6.6.1. Paranoia is a powerful tool used by the NSA. It
provides a means to develop the subject's distrust of other people including the
subject's primary group that could provide positive support during this time of
distress in the subject's life. Paranoia is often recognized and discounted as a
character fault by most peoples in American society and therefore discredits the
subject's testimony even further. Uninformed, but well wishing people including
friends, may recommend to the subject to pursue counseling. This negative
feedback can make the subject fear that people will believe the subject is
crazy.
8.3.6.6.2. When the subject seeks professional counseling,
the result will be a misdiagnosis with an expensive, inappropriate and
ineffective treatment. The observed symptoms result from simply hypnosis, not
biological, chemical, or environmental stresses. A misdiagnosis strongly
motivates the subject not to communicate their experiences to others to avoid
social disgrace of a "schizophrenia" label and additional financial burden. This
isolation of the subject and their reluctance to communicate their experience to
others reduces NSA security risk. The NSA cannot allow the subject to share
information with other subjects that have already experienced the program and
thereby starting a pool of information that could be compiled and used to expose
the NSA system.
8.3.6.6.3. The subject is led to believe that the subject's
neighbors, work associates and/or family are conspiring against the subject
through a number of scripts delivered to the subject by the NSA. The NSA can
further complicate the conspiracy delusion by using the same technology to have
a work associate ask the subject a question or to make a comment that can be
used by the NSA to confirm the subjects fears. This technique further isolates
the subject from trusting their peer groups, causes additional emotional
distress and hostility toward these people. The subject sometimes resorts to
violent behavior, which is viewed by observers as irrational, unprovoked
behavior that may be treated as criminal behavior by law enforcement personnel.
8.3.7. Stage 3 (Extreme Process):
8.3.7.1. This method is very severe and usually results in
a two to five year program. Because of the severity of the suffering, the
subject is usually permanently impaired for integration into normal mainstream
life and is essentially institutionalized. The result is that the subject must
reside in a less competitive environment likeRemoved by jar2. Subjects that
receive this program tend to be highly superstitious, are agitated easily when
objective evidence that contradicts their belief system is presented.
They tend to believe in the spiritual world (demons,
ghosts, god, spiritual entities, etc) and consider the spiritual world to be
more powerful and important than the material or real world. This program
basically follows the following steps; REM deprivation, breakdown of self esteem
and confidence, intense suffering, exaggerated conscience, spiritual contact,
Removed by jar2t, Removed by jar2, and recovering (Removed by jar2Whenever
possible the NSA will skip or reduce these steps to minimize security risk and
financial cost.
8.3.7.2. Increasing Dependence on Drugs and Alcohol:
8.3.7.2.1. As the REM Deprivation increases the subject
must depend on Central Nervous System (CNS) Stimulants to compensate for
degradation of productivity at work, school, and in interpersonal relationships.
This serves the NSA in several ways. Use of drugs (especially CNS stimulants)
increases the subject's index of suggestibility. Or in other words, the post
hypnotic commands are more effective and the subject has greater difficulty
resisting the impulses generated by the commands.
In addition, the increased stress of coping with the drugs
in conjunction with the resisting the newly introduced posthypnotic commands
serves to push the subject closer to an emotional breakdown. If the subject uses
illegal drugs, the NSA tries to set the subject up for a conviction to get
assure that the subject looses credibility. Who would believe a drug user that
claimed that he/she was being harassed by a government agency that was
tormenting them with hypnosis? It also serves the NSA in the program by
documenting something that the subject will be ashamed of when the program
reaches the exaggerated conscience stage.
8.3.7.2.2. Alcohol, sleeping pills and other medications
also inhibit REM Stage sleep and increase irritability over time thereby further
degrading and isolating the subject.
8.3.7.2.3. In summary, the NSA benefits from the subject
responding to the REM Deprivation assault with self-medication. This response
discredits the subject by labeling them in society as a drug user, it enhances
the effect of the implanted posthypnotic commands and it gives the subject a
reason for shame that will be used against the subject later to justify the
punishment fromRemoved by jar2 It should be noted that the subject is not really
guilty of anything, except being a victim that was manipulated in a carefully
controlled scientific behavior modification process.
8.3.7.3. Poor Nutrition:
8.3.7.3.1. The poor nutrition reduces the energy the
subject has and serves later as Removed by jar2
8.3.7.4. Apathy:
8.3.7.4.1. After the subject's self-esteem is broken down
and continuing failure and persistent suffering start to dominate every day, the
individual becomes apathetic as a defense mechanism. At this stage the subject
has committed another sin of "Removed by jar2 which is later used on the subject
later to increase a feeling of guilt.
8.3.7.5. Depression:
8.3.7.5.1. Depression precipitates as a result of chronic
REM Sleep Deprivation, social isolation and a feeling of helplessness in the
subject. Commonly, when the subject seeks professional counseling, they are
misdiagnosed and treated for depression with medications but the root cause of
the problem (negative reinforcing posthypnotic suggestions inflicted over long
periods of time) is not treated or corrected.
8.3.7.6. Insecurity:
8.3.7.6.1. The subject starts to experience severe
insecurity in this stage. The NSA uses this insecurity against the subject in
several ways. Because of the impaired reasoning ability and emotional isolation,
the subject is susceptible to the approaches of insincere people, which are used
by the NSA to emotionally hurt the subject more.
This allows the NSA to convince the subject that people
can't be trusted and that only the NSARemoved by jar2can be trusted. This serves
to isolate the subject from supportive peer groups and makes the subject
emotionally dependent on the NSA resulting in the NSA gaining more power in the
subject's life.
8.3.7.7. Journals and Diaries:
8.3.7.7.1. Most of the subjects are directed to keep a
"Journal" or diary by the NSA so that the subject can record and review
feelings, events, observations, and "Removed by jar2" that normally would be
unavailable due to short term memory loss during extended periods of REM
Deprivation. The NSA uses the Subject's Journals in a variety of ways.
8.3.7.8. Degrading Spelling and Grammatical Performance:
8.3.7.8.1. Subjects in these prolonged stages of REM
deprivation, confusion, and emotional distress, have very poor grammar,
spelling, and short attention spans.
8.3.7.9. Slowed Speech:
8.3.7.9.1. Subjects experience slower speech and have a
greater time articulating concise points as a result of the REM Deprivation and
other performance degrading posthypnotic commands. Very slight alcohol
consumption can exasperate the damage of REM Deprivation and precipitate slurred
speech.
8.3.7.10. Confusion:
8.3.7.10.1. Confusion results from three primary sources;
REM Deprivation, specific posthypnotic commands to reinforce the confusion, and
the emotional damage and stress that is being inflicted. The confusion allows
the NSA to continuously inflict damage to the subject's life without real-time
observation. A confused person generally is not as productive as an organized
clear thinker is and has a greater potential to offend people by what they say
or do and is less likely to recognize when they have made mistakes. All of these
symptoms assist the NSA's objectives in this stage and subsequent stages. In
addition, the confusion restricts the individual from analyzing the source of
their suffering and taking corrective actions, and therefore reduces the NSA's
security risk.
8.3.7.11. Poor Concentration:
8.3.7.11.1. Difficulty concentrating impairs the subject's
productivity and restrains the subject from making self-improvements and
corrections in behavior. It makes it very difficult for the subject to do any
research or reading to evaluate his/her condition. This paves the way for the
NSA to demonstrate that the subject cannot do anything on their own without
"God", thereby increasing the frustration and anxiety of the subject (inducing
emotional breakdown) and ultimateRemoved by jar2ly making the subject totally
dependant on Removed by jar2
8.3.7.12. Loose Association and Personality Disorders:
8.3.7.12.1. The subject experiences disjointed thought at
this stage (Loose Association) that appears to observers as a strange sense of
humor or inappropriate responses when engaging in conversations. Ongoing sarcasm
and other negative attitudes and undesirable personality traits can be present.
8.3.7.13. Anger:
8.3.7.13.1. The way that the subject experiences anger is
of profound importance. If the subject allows the NSA to redirect the increasing
anger and hostilities toward the NSA to another person in the form of violence
(misplaced aggression), the NSA will reinforce the violent behavior with
posthypnotic commands. The result is a person that can achieve national acclaim
as a murderer that heard voices of Satan directing him/her. Typically, the
Subject is encouraged to commit acts of violence with spouses, friends, or
employers resulting in further social isolation and increased shame.
Some examples of NSA directed victims of misplaced
aggression include recent US Postal Workers whom work within the Postal Service.
This is one of the vial "communication intercept" channels the NSA is directed
to monitor. The routes of suspect mail and the postal worker processing it are
continuously monitored by NSA. Sometimes the NSA ODO takes issue with a Postal
Worker and harasses them or subjects the postal worker to behavioral
modification.
8.3.7.14. Delusions:
8.3.7.14.1. Delusions are used to discredit the witness and
also provide an additional source for fear, intimidation and confusion.
Delusions can be but are not limited to the Subject developing conspiracy
theories of fellow employees and friends, beliefs that Angels or Demons are
communicating or visiting them, tingling sensations from microwave guns or
implants, beliefs in supernatural events, etc.
8.3.7.15. Audio Hallucinations:
8.3.7.15.1. Subjects often report hearing walls clicking,
footsteps in the house, the sound of someone trying to open the door, drilling
at the door, etc.
8.3.7.15.2. These audio hallucinations are also used to
discredit the witness and also provide an additional source for paranoia, fear,
and negative reinforcement.
8.3.7.16. Voices in the Subject's Mind:
8.3.7.16.1.1. The voices in the subject's mind are achieved
in a variety of ways using real-time and prescheduled posthypnotic suggestion
deliveries, and Noun Substitution implant techniques.
8.3.7.16.2. Noun Substitution Posthypnotic Implant:
8.3.7.16.2.1. The subject can have a posthypnotic
suggestion implanted that changes the form of pronouns in the subject's internal
thinking. The result is the subject perceives that someone is telling him/her to
do something with nearly every thought. An example is; the subject thinks, "I
should Removed by jar2". With the noun substitution posthypnotic suggestion the
subject experiences the following internal thought, "You should go to church
today!"
Notice that by implanting the posthypnotic command into the
subject's subconscious mind to think the pronoun "You" instead of "I" the
subject will perceive that they are being directed by a voice even though the
majority of the internal thought content is their own naturally occurring
thought. This subconscious implant can be used in combination with other
implants to increase the subject's perception of threat, fear, and therefore
paranoia.
It can be used with other posthypnotic suggestion implants
that will give the subject the perception of either a "good" or "evil" voice or
spirit is directing him/her. This implant is powerful because it gives the
subject the perception that the sRemoved by jar2 knows and directs the subject's
every thought. It provides a convincing proof that Removed by jar2. Subjects
that don't have a superstitious frame of reference and seek professional help
are usually misdiagnosed as schizophrenic. 8.3.7.17. Tinnitus (Ear Ringing):
8.3.7.17.1. Tinnitus is commonly reported by subjects
harassed by the NSA and typically has no pharmacological or biochemical basis
and is produced by a posthypnotic suggestion. It is often misdiagnosed as
ringing caused by excessive aspirin use and is actually an audio hallucination
triggered by hypnosis.
8.3.7.18. Complete Quiet Silence:
8.3.7.18.1. Used by the NSA as a positive reinforcement for
two general reasons; the subject has the tinnitus removed to indicate that the
subject has "Removed by jar2", and secondly, the subject has achieved a
milestone toward being releasedRemoved by jar2the NSA).
8.3.7.19. Quiet Wind:
8.3.7.19.1. The audio hallucination of a quiet wind is used
to Removed by jar2
8.3.7.20. Visual Hallucinations:
8.3.7.20.1. Visual hallucinations are usually implanted in
the waking moments when a subject is coming out of sleep or is in a
somnambulatory state (light sleep) preferably in a darkened room. The
hallucinations are fleeting, usually lasting less than one minute and are not
durable. Typical hallucinations reported by subjects are Angels, large spiders,
and movement of various shadowy objects across the ceiling, bright spot of light
ahead of the subject, etc.
8.3.7.20.2. The television show "Sightings" has had
numerous reports of people seeing "Aliens" at waking moments. These types of
news accounts create confusion in US society and serve to keep people searching
for the wrong phenomenon thus keeping the NSA's technology secure
(disinformation).
8.3.7.21. Tactile, Olfactory hallucinations and Muscle
Spasms:
8.3.7.21.1.1. Tactile hallucinations can be more durable
and are used to communicate a desired direction to the subject typically after a
real-time interrogation. Typical behavioral cues issued by the NSA are
manifested in the form of:
8.3.7.21.1.1.1. Temporary sensation of pressure to the tip
of the right index finger (symbolizing Faith or have Faith).
8.3.7.21.1.1.2. Temporary sensation of pressure to the tip
of the left index finger (symbolizing no Faith or "deception of Satan").
8.3.7.21.1.1.3. Temporary sensation of pressure to the
center of the right palm (symbolizing Jesus "Sitting at the right-hand of God").
8.3.7.21.1.1.4. Temporary sensation of pressure to the ball
of the right foot (symbolizing "Get on the Ball" or "hurry-up").
8.3.7.21.1.1.5. Temporary sensation of pressure to the tip
of the right foot big toe (symbolizing "Right Direction").
8.3.7.21.1.1.6. Temporary sensation of pressure to the tip
of the right foot center toe (symbolizing "messing up Direction").
8.3.7.21.1.1.7. Temporary sensation of pressure to the tip
of the left foot big toe (symbolizing "Wrong Direction").
8.3.7.21.1.1.8. Temporary sensation of pressure to the
buttocks (symbolizing "Bad Attitude" or "subject is acting like an ass").
8.3.7.21.1.1.9. Temporary sensation of pressure on tip of
penis or clitoris (symbolizes immoral thoughts like subject is thinking/acting
with his penis or her clitoris).
8.3.7.21.1.1.10. Temporary sensation of pressure to the
left ear drum (symbolizing "do not listen").
8.3.7.21.1.1.11. Temporary sensation of pressure to the
right ear drum (symbolizing "listen").
8.3.7.21.1.1.12. An involuntary blink of the right or left
eye (symbolizing: right eye = God's agreement or left eye = Satan's agreement).
8.3.7.21.1.1.13. Temporary tingling sensation on the
Testicles (symbolizing insufficient male confidence or "Having no balls or
strength").
8.3.7.21.1.1.14. Temporary tingling on other areas of the
body to imply that something invisible and/or supernatural is touching the
subject. May be perceived as threatening or reassuring to the subject. Can be
used to intimidate and confuse the subject often times combined with additional
posthypnotic implants to inflict delusions like "being attacked with microwaves"
or being caressed by Angels.
8.3.7.21.1.1.15. Muscular spasm or perceived pressures near
the jugular vein on right side of neck (symbolizingRemoved by jar2 having
subject by Jugular or throat). This is used to inflict fear and doubt.
8.3.7.21.1.1.16. Muscular spasms are sometimes used to
inflict severe pain on the subject by causing extreme involuntary contraction of
the sphincter in the anal region or other lower back or leg muscles.
8.3.7.21.1.1.17. Perceived odor sensation of a thick, sweet
smell (symbolizing Satan's sweet victory over the subject's soul).
9. Misc
This section is written in an attempt to provide interested
individuals with some of the considerations and precautions when seeking to
demonstrate the NSA's civil rights abuses by demonstrating the effectiveness and
concepts of subliminal access using Subliminal Implanted Posthypnotic
Suggestions and Scripts Using Acoustically Delivered and Phonetically
Accelerated Posthypnotic Commands without Somnambulistic Preparation in the
Subject.
9.1. Reverse engineering of the NSA's technology to prove
it's abuses against the American people is quite difficult. Consider the
following.
9.2. If the scientists and technicians perform their
research in a facility that the NSA has the standard transceivers installed, and
therefore the NSA can influence the direction of research or the data by
effecting perceptual effects in the researchers. These perceptual effects can be
confusion, lack of attention to important details, oversights, bad assumptions,
incorrect interpretation of the test data. These same misperceptions will also
be incorporated into the research test subjects. The technology cannot be
developed and optimized if the NSA has any access to the test subjects.
The test scripts given to the test subject delivered from
the researcher can be neutralized by the NSA delivering a canceling script
immediately after the researcher's script. The NSA's test script can also
include a hypnoamnesia script at the end to cancel any residual perception in
the subject so that the test subject would report no effects and the researcher
would conclude the test script had no effect.
9.3. The research must be carried out in a facility secured
from all NSA electronic intrusion. All equipment in the facility must be TEMPEST
protected and electrically isolated from the outside world. The research
personnel and their subjects must never leave the secured area of the facility
so that they cannot be subliminally interrogated by the NSA. The NSA would take
this opportunity to deliver disinformation scripts to the subject or researcher.
Foodstuffs and supplies would be the logical choice of NSA intrusion if all
other security measures were effective against the NSA.
9.4. The NSA will exploit all opportunities to introduce
microscopic transceivers into the facility of it's surrounding grounds. The
minimal requirements for the NSA to take control of the research are:
9.4.1. NSA audio delivery (a micro receiver with a micro
speaker)
9.4.2. Visibility of the targets (researcher or test
subject) to capture response labels during subliminal interrogations. This can
be through normal illumination or infrared to see through window, or millimeter
wave or other technologies that can see through barriers like walls and
ceilings.
9.4.3. Audible response labels can be used if the NSA has a
micro receiver with a micro speaker inside but cannot get a transmitter in and
operating without detection. Sneezes, coughs, clearing of throat that can be
picked up by laser microphones, audible amplification microphones, etc. can also
be used as response labels.
9.5. The NSA currently has satellites with millimeter wave
technology that will allow visible intrusion into most facilities. The test
facilities should be deep underground, AKA 100 feet with no adjacent access from
other facilities, sewer lines, water lines or power conduits etc.
9.6. Any facilities existing will have to be debugged
before habitation and research begins.
9.7. Subjects must be able to be subjected to traditional
hypnosis after facility habitation as a test prior to research to assure that
the NSA has minimal scripts already implanted.
9.8. This technology is the highest level of intelligence
gathering for the USA. The abuses resulting from mismanagement of this area of
the NSA's intelligence system must force Congress to legislate additional laws
to protect the citizens. The NSA must regulate this system better. The NSA will
take all necessary steps without limit to assure that this technology is
preserved and autonomously under their control.
10. Conclusion:
America's greatest and highest level intelligence asset is
being mismanaged and the mismanagement must be corrected before all the Enemies
of our great country acquire it. Imagine if China Removed by jar2 11. May
Removed by jar2preserving and managing this vital technology's vital potential
to serve America's National Security.
United States National Security Agency
|